تحديات خصوصية وأمن بيانات المستفيدين في المكتبات الرقمية: مراجعة للإنتاج الفكري

المؤلفون

  • عمر حسن عبد الرحمن جامعة الخرطوم، قسم علوم المكتبات والمعلومات

DOI:

https://doi.org/10.70000/cj.2026.78.670

الكلمات المفتاحية:

المكتبات الرقمية، خصوصية البيانات، أمن المعلومات، الذكاء الإصطناعي، مراجعة الإنتاج الفكري

الملخص

تُعد المكتبات الرقمية ركيزة أساسية للبحث والتعلم في العصر الحديث، حيث وسعت التطورات التقنية نطاق وصولها العالمي. ومع ذلك، أدى هذا التوسع إلى زيادة جمع ومعالجة بيانات المستخدمين لتقديم تجارب مخصصة، مما أثار مخاوف حرجة بشأن الخصوصية والأمن. تسلط هذه الوثيقة الضوء على التوازن المعقد بين الاستفادة من البيانات لتحسين الخدمات وبين حمايتها من التهديدات المتزايدة. تشير النتائج إلى أن الهجمات السيبرانية، مثل برامج الفدية واختراقات البيانات، لم تعد مجرد احتمالات بل واقعاً واجهته مؤسسات كبرى مثل المكتبة البريطانية وأرشيف الإنترنت. يتطلب تأمين هذه البيانات نهجاً متعدد الأبعاد يشمل التدابير التقنية، والامتثال التنظيمي، مثل لائحة GDPR، وتبني "الخصوصية بالتصميم" كمعيار أساسي، خاصة مع دمج التقنيات الناشئة مثل الذكاء الاصطناعي وسلسلة الكتل (Blockchain).

المراجع

Aregbesola, A., & Nwaolise, E. L. (2023). Securing digital collections: Cyber security best practices for academic libraries in developing countries. Library Philosophy and Practice. https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=15048&context=libphilprac

Ascot London. (2024, October 15). Enhancing cyber resilience: Lessons from the British Library’s ransomware attack. https://ascot.london/enhancing-cyber-resilience-lessons-from-the-british-librarys-ransomware-attack⁠

Ashikuzzaman, M. (2024, June 2). Types of data libraries can collect and analyse to enhance their services. Lisedu Network. https://www.lisedunetwork.com/types-of-data-libraries-can-collect-and-analyze-to-enhance-their-services/⁠

Cetin, M. B. (2024). Evaluating the effects of digital privacy regulations on user trust (Master’s thesis). https://arxiv.org/pdf/2409.02614⁠

Chancey, T. (2024, January 12). Big data privacy issues: Protect your data with advanced analytics and security. The Scarlett Group. https://www.scarlettgroup.com/big-data-privacy-concerns/⁠

Computer Weekly. (2024, January 15). British Library cyber-attack explained: What you need to know. https://www.computerweekly.com/feature/British-Library-cyber-attack-explained-What-you-need-to-know⁠

Cynomi. (n.d.). What is regulatory compliance? https://cynomi.com/learn/regulatory-compliance/⁠

DomainTools. (2024, October 23). Rogue hackers and the Internet Archive breach: 31 million accounts exposed [Podcast]. Breaking Badness Podcast. https://www.domaintools.com/resources/podcasts/rogue-hackers-and-the-internet-archive-breach-31-million-accounts-exposed/⁠

EC-Council University. (2025, May). Understanding data breaches: What you need to know. https://www.eccu.edu/blog/data-breaches-threats-and-consequences/⁠

GeeksforGeeks. (2025, May 24). 7 privacy challenges in cloud computing. https://www.geeksforgeeks.org/privacy-challenges-in-cloud-computing/⁠

Granados, A. (2024, November 25). AI and personal data: Balancing convenience and privacy risks. Velaro Blog. https://velaro.com/blog/the-privacy-paradox-of-ai-emerging-challenges-on-personal-data⁠

Greengard, S. (2025, June 7). Internet of Things. Britannica. https://www.britannica.com/science/Internet-of-Things⁠

Gunter, D. (2024, February 22). AI challenges for librarians. Research Information. https://www.researchinformation.info/analysis-opinion/ai-challenges-librarians/⁠

Hanif et al. (2025). Blockchain technology in libraries: Ensuring data security and transparency. Journal of Applied Linguistics and TESOL, 8(1). https://jalt.com.pk/index.php/jalt/article/view/423⁠

Harper, M., & Oltmann, S. M. (2017). Big data’s impact on privacy for librarians and information professionals. Bulletin of the Association for Information Science and Technology,43(4), 19–23. https://doi.org/10.1002/bul2.2017.1720430406⁠

Heckel, J. (2023, December 7). Study shows challenges to protecting privacy of library users. University of Illinois News Bureau. https://news.illinois.edu/study-shows-challenges-to-protecting-privacy-of-library-users/⁠

Help Net Security. (2024, October 21). The Internet Archive breach continues. https://www.helpnetsecurity.com/2024/10/21/internet-archive-breach-continues/⁠

Indraji, C., & Satishkumar, N. (2025). Application of cloud computing in libraries: Prospects and challenges. International Journal of Novel Research and Development, 10(2), b315–b322. http://eprints.rclis.org/46434/1/IJNRD2502143.ocr.pdf⁠

Information and Privacy Commissioner of Ontario. (2025, March 24). Toronto Public Library cyberattack: A wake-up call for stronger security. https://www.ipc.on.ca/en/cases-of-note/toronto-public-library-cyberattack⁠

Institute of Electrical and Electronics Engineers. (2025a). Emerging data privacy laws and regulations around the world. https://digitalprivacy.ieee.org/publications/topics/emerging-data-privacy-laws-and-regulations-around-the-world/⁠

Institute of Electrical and Electronics Engineers. (2025b). Understanding privacy in the digital age. https://digitalprivacy.ieee.org/publications/topics/understanding-privacy-in-the-digital-age/⁠

International Federation of Library Associations and Institutions. (2015, August 15). Statement on privacy in the library environment. https://www.ifla.org/publications/ifla-statement-on-privacy-in-the-library-environment/⁠

Investopedia Team. (2022, September 30). Cloud security: Definition, how cloud computing works, and safety. Investopedia. https://www.investopedia.com/terms/c/cloud-security.asp⁠

Işık, Ö. (2024, September 30). Full transparency: 10 lessons from the cyber-attack on the British Library. IMD. https://www.imd.org/ibyimd/technology/full-transparency-10-lessons-from-the-cyber-attack-on-the-british-library/⁠

ISTARI. (2024, July). Learning lessons from the cyber-attack. https://istari-global.com/insights/spotlight/learning-lessons-from-the-cyber-attack/⁠

jrose. (2024, October 31). Unwelcome AI: Examining the negative impacts on libraries. LibLime Blog. https://liblime.com/2024/10/31/unwelcome-ai-examining-the-negative-impacts-on-libraries/⁠

Kadali, S., & Chary, K. D. (2017). Key issues and challenges in cloud computing for library services. IOSR Journal of Engineering, 7(12), 80–82. https://doi.org/10.9790/9622-0712038082⁠

Kahle, B. (2024a, October 18). Internet Archive services update: 2024-10-17. Internet Archive Blogs. https://blog.archive.org/2024/page/4/⁠

Kahle, B. (2024b, November 14). Learning from cyber-attacks. Internet Archive Blogs. https://blog.archive.org/tag/ddos/⁠

Kahn, M. (2025, February 27). Cloud computing in libraries: Revolutionizing the way we store and access knowledge. MK Library. https://www.mklibrary.com/cloud-computing-in-libraries-revolutionizing-the-way-we-store-and-access-knowledge/⁠

Kan, M. (2024, October 11). After breach, Internet Archive expects to return within “days, not weeks.” PCMag. https://www.pcmag.com/news/after-breach-internet-archive-expects-to-return-within-days-not-weeks⁠

Kornfeind, M. (2022). Public libraries and information privacy policies: A case of the Naperville Public Library and privacy trends in the LIS profession. World Libraries, 26(2). https://worldlibraries.dom.edu/index.php/worldlib/article/view/595⁠

Kumar, B. T. S., & Usha, S. S. (2024). IoT-based services in digital libraries: Innovations, benefits and concerns. Proceedings of the International Conference on Emerging Trends in Information Technology (March 15–16, 2024, Bengaluru, India). Library Philosophy and Practice. https://digitalcommons.unl.edu/libphilprac/1479⁠

Magsi, I., Shaheen, N., Channar, W. A., Ali, M., Lakho, Z., Ahmed, A. (2025). Cybersecurity challenges in digital libraries. Review Journal of Social Psychology and Social Works, 3(1), 344–350. https://rjspsw.com/pdf/v3/i1/11.pdf⁠

Masinde, J., Mugambi, F., & Muthee, D. W. (2025). Big data and personal information privacy in developing countries: Insights from Kenya. Frontiers in Big Data, 8, 1532362. https://doi.org/10.3389/fdata.2025.1532362⁠

Matonkar, P. V. (2024). Library security in the digital age: Cyber threats and solutions. In The Knowledge Nexus. Creative Book Publisher. https://www.researchgate.net/publication/385092279_Library_Security_in_the_Digital_Age_Cyber_Threats_and_Solutions⁠

Microsoft Azure. (2025). What is cloud computing? https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-cloud-computing/⁠

Mullsjafari, S., & Bechkoum, K. (2023). Blockchain technology and related security risks: Toward a seven-layer perspective and taxonomy. Sustainability, 15(18), 13401. https://doi.org/10.3390/su151813401⁠

Narendra, A. P., Gunawan, L. S., & Setiawan, A. S. A. (2024). Artificial intelligence implementation in library information systems: Current trends and future studies. Vietnam Journal of Computer Science, 1(25). https://doi.org/10.1142/S2196888824300023⁠

Noh, Y. (2017). A critical literature analysis of library and user privacy. International Journal of Knowledge Content Development & Technology, 7(2), 53–83. https://doi.org/10.22744/IKCDT.2017.7.2.053⁠

Office of the Victorian Information Commissioner. (n.d.). Internet of Things and privacy – Issues and challenges. https://ovic.vic.gov.au/privacy/resources-for-organisations/internet-of-things-and-privacy-issues-and-challenges/⁠

Perry, Y. (2019, September 17). Data compliance for regulations around the world. NetApp Blog. https://www.netapp.com/blog/data-compliance-regulations-hipaa-gdpr-and-pci-dss/⁠

Porsche, L., Suchá, L. Z., & Martinek, J. (2022). The potential of Google Analytics for tracking reading behavior in web books. Digital Library Perspectives, 38(4). https://doi.org/10.1108/dlp-03-2022-0021⁠

Prasanna, R., & Yogendra, S. (2023). The role of artificial intelligence in enhancing digital library services. Journal of Emerging Technologies and Innovative Research, 10(12), f712–f723. https://www.researchgate.net/publication/390089610_The_Role_of_Artificial_Intelligence_in_Enhancing_Digital_Library_Services⁠

PressReader Team. (2024, November 12). Enhancing patron and staff experience: The Internet of Things in libraries. https://blog.pressreader.com/libraries-institutions/enhancing-patron-and-staff-experience-the-internet-of-things-in-libraries⁠

PressReader. (2024, July 17). Public libraries and cybersecurity: Keeping patrons' data safe. https://blog.pressreader.com/libraries-institutions/public-libraries-and-cybersecurity-keeping-patrons-data-safe⁠

Rao, M. H., & Prasad, G. S. (2025). Enhancing security and privacy in digital libraries using blockchain technology. In Proceedings of the 7th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2025) (pp. 82–90). Atlantis Press. https://doi.org/10.2991/978-94-6463-712-0_9⁠

Saha, R. (2024). Data privacy and cybersecurity in digital library perspective: Safeguarding user information. International Journal of Scientific Research in Engineering and Management, 8(4). https://doi.org/10.55041/IJSREM30761⁠

SAS. (n.d.). Big data analytics: What it is and why it matters. https://www.sas.com/en_us/insights/analytics/big-data-analytics.html⁠

Singh, U., & Chaudhari, A. M. (2022). Evaluating strategies for improving user privacy in digital libraries. International Journal of Food and Nutritional Sciences, 11(13),49–55 https://www.ijfans.org/issue-content/evaluating-strategies-for-improving-user-privacy-in-digital-libraries-13080⁠

Stryker, C., & Kavlakoglu, E. (2024, August 9). What is artificial intelligence (AI)? IBM. https://www.ibm.com/think/topics/artificial-intelligence⁠

Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT privacy and security: Challenges and solutions. Applied Sciences, 10(12),4102. https://doi.org/10.3390/app10124102⁠

The British Library. (2024, March 8). British Library cyber review. https://cdn.sanity.io/files/v5dwkion/production/99206a2d1e9f07b35712b78f7d75fbb09560c08d.pdf⁠

Timonera, K. (2024, November 27). Understanding AI privacy: Key challenges and solutions. eWeek. https://www.eweek.com/artificial-intelligence/ai-privacy-issues/⁠

Toronto Newswire. (2024, February 12). City taking action to prevent cyber attacks that targeted libraries, hospitals, and zoo. https://torontonewswire.com/the-city-taking-action-to-prevent-cyber-attacks-that-has-rocked-our-libraries-and-zoo/⁠

Toronto Public Library. (2024). Cybersecurity response and business continuity. https://www.urbanlibraries.org/innovations/cybersecurity-response-and-business-continuity⁠

TrustCloud Community. (2025, April 2). Data privacy in 2025: What lies ahead? Trends and predictions. https://community.trustcloud.ai/article/data-privacy-in-2025-what-lies-ahead-trends-and-predictions/⁠

Usman, M., & Ullah, A. (2024). Application of blockchain technology in digital libraries. In Proceedings of the International Conference on Advanced Technologies in Computing and Systems (ATICS 2024). AvePubs. https://avepubs.com/uploads/articles/171633893072904.%20ATICS-09-2024.pdf⁠

Wang, J. (n.d.). Usage statistics. SPARC Open. https://sparcopen.org/our-work/negotiation-resources/data-analysis/usage-statistics/⁠

Warren, T. (2024, October 14). The Internet Archive is back as a read-only service after cyberattacks. The Verge. https://www.theverge.com/2024/10/14/24269741/internet-archive-online-read-only-data-breach-outage⁠

Xu, H., & Zhang, N. (2023). Privacy implications of blockchain systems: A data management perspective. Organizational Cybersecurity Journal: Practice, Process, and People. https://doi.org/10.1108/ocj-01-2023-0003⁠

Yadav, P. (2024). Cloud computing in university libraries: Transforming access, management, and service delivery. International Research Journal of Engineering and Technology, 11(9), 649–654. https://www.irjet.net/archives/V11/i9/IRJET-V11I994.pdf⁠

Zgzsur. (2024, November 10). What I learned from the Internet Archive hack and its aftermath: Personal reflections. https://wp.catedu.es/zgzsur/what-i-learned-from-the-internet-archive-hack-and-its-aftermath/⁠

منشور

2026-04-29

كيفية الاقتباس

عبد الرحمن ع. ح. (2026). تحديات خصوصية وأمن بيانات المستفيدين في المكتبات الرقمية: مراجعة للإنتاج الفكري. Cybrarians Journal, (78), 24–48. https://doi.org/10.70000/cj.2026.78.670